Search the Catalog

Java Cryptography

Table of Contents




Preface

1. Introduction
     Secure Systems
     Cryptography
     Platform Security
     Astute Inequalities
     Hello, zoT1wy1njA0=!

2. Concepts
     Confidentiality
     Integrity
     Authentication
     Random Numbers
     Algorithms

3. Architecture
     Alphabet Soup
     Concept Classes
     API and SPI
     Factory Methods
     Standard Names
     The Provider Architecture
     Key Management
     Summary

4. Random Numbers
     SecureRandom
     Self-Seeding
     Keyboard Timing
     SeederDialog

5. Key Management
     Keys
     Key Generators
     Key Translators
     Key Agreement
     The Identity Key Management Paradigm
     The KeyStore Key Management Paradigm

6. Authentication
     Message Digests
     MACs
     Signatures
     Certificates

7. Encryption
     Streams and Blocks
     Block Ciphers
     Algorithms
     javax.crypto.Cipher
     Cipher's Close Relatives
     Passphrase Encryption
     Inside Cipher
     Hybrid Systems

8. Signed Applets
     Renegade
     HotJava
     Navigator
     Internet Explorer
     Summary

9. Writing a Provider
     Getting Started
     Adding the ElGamal Classes
     ElGamal
     Generating Keys
     Signature
     Cipher

10. SafeTalk
     Using SafeTalk
     Under the Hood

11. CipherMail
     Using CipherMail
     Under the Hood

12. Outside the Box
     Application Design
     Decompilers and Bytecode Obfuscation
     Endpoint Security
     File Security
     Network Security
     Summary

A. BigInteger

B. Base64

C. JAR

D. Javakey

E. Quick Reference

Index

Return to Java Cryptography


oreilly.com Home | O'Reilly Bookstores | How to Order | O'Reilly Contacts
International | About O'Reilly | Affiliated Companies | Privacy Policy

© 2001, O'Reilly & Associates, Inc.
webmaster@oreilly.com